How to install the php mcrypt module on RHEL 6

by tyler in php, webdev | 1 min
1

Download the following rpm packages

wget http://dl.fedoraproject.org/pub/epel/6/x86_64/php-mcrypt-5.3.3-1.el6.x86_64.rpm wget http://dl.fedoraproject.org/pub/epel/6/x86_64/libmcrypt-2.5.8-9.el6.x86_64.rpm

2

Install mcrypt via yum

yum localinstall php-mcrypt-5.3.3-1.el6.x86_64.rpm libmcrypt-2.5.8-9.el6.x86_64.rpm

3

Restart apache

/etc/init.d/httpd restart

4

Confirm that it installed properly

php -m** should show in the list: mcrypt*

Tyler's profile pictureTyler
Joined in 2015
Software Engineer and creator of howchoo.
Related to this guide:
Changing ADT Safewatch Pro batteryChanging ADT Safewatch Pro battery
Stop the random chiming and install a new battery in minutes.
Zach's profile picture ZachView
In these interests: homesecurity
How to Use a YubiKey with LastPass for MFA/2FAHow to Use a YubiKey with LastPass for MFA/2FA
In these interests: lastpasssecurity
People also read:
Public key encryption is also known as asymmetric because it requires two different keys – a public key and a private key. Encryption requires the public key, and decryption requires the private key.
block websites on Chrome
Create and manage your own blacklist.
How to Use a Router
Understand what your wireless router is capable of and what you can do with it.
Delete iPhone apps
Deleting has never been easier
VPN from Windows 10
Learn how to connect to your work or private VPN on Windows.
Don’t want to delete your passwords one at a time? No problem.
Posted in these interests:
internetinternet
A series of tubes.
technologytechnology
“Any sufficiently advanced technology is indistinguishable from magic.” – Alan C. Clarke, science fiction writer, TV host, underwater explorer and inventor.
Discuss this guide:
We’re hiring!
Are you a passionate writer or editor? We want to hear from you!
We’re hiring!
Are you a passionate writer or editor? We want to hear from you!

Want to support Howchoo? When you buy a tool or material through one of our Amazon links, we earn a small commission as an Amazon Associate.

Want to support Howchoo? When you buy a tool or material through one of our Amazon links, we earn a small commission as an Amazon Associate.

Total time: 1 minute 
Updated: October 18th, 2015
Calling all writers!

We’re hiring. Write for Howchoo

security
PRIMARY
23 guides
internet
71 guides
technology
5 guides
Calling all writers!

We’re hiring. Write for Howchoo

Tyler's profile pictureTyler
Joined in 2015
Software Engineer and creator of howchoo.
Stop the random chiming and install a new battery in minutes.
Zach's profile picture ZachView
In these interests: homesecurity
In these interests: lastpasssecurity
In these interests: cryptographysecurity
Public key encryption is also known as asymmetric because it requires two different keys – a public key and a private key. Encryption requires the public key, and decryption requires the private key.
Web browser developers are continually inventing new ways to improve your browsing experience, and typing is a challenge for many users.
Take a video, it will last longer.
Lights, camera, action!
Create and manage your own blacklist.
Understand what your wireless router is capable of and what you can do with it.
Deleting has never been easier
Learn how to connect to your work or private VPN on Windows.
security
PRIMARY
A series of tubes.
“Any sufficiently advanced technology is indistinguishable from magic.” – Alan C. Clarke, science fiction writer, TV host, underwater explorer and inventor.